WHAP: Web-hacking profiling using Case-Based Reasoning

Mee Lan Han, Hee Chan Han, Ah Reum Kang, Byung Il Kwak, Aziz Mohaisen, Huy Kang Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

As in the real world's criminal investigation, cyber criminal profiling is important to attribute cyber attacks. Every cyber crime committed by the same hacker or hacking group has unique characteristics such as attack purpose, attack methods, and target's profile. Therefore, a complete analysis of the hacker's activities can give investigators hard evidence to attribute attacks and unveil criminals. In this paper, we implemented WHAP, a profiling system that uses Case-Based Reasoning (CBR). We verified WHAP's usefulness by analyzing large scale of web defacement cases including North Korean hacker's attacks against South Korea, and unveiling a relationship between those attacks and another set of attacks against Sony Pictures Entertainment.

Original languageEnglish
Title of host publication2016 IEEE Conference on Communications and Network Security, CNS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages344-345
Number of pages2
ISBN (Electronic)9781509030651
DOIs
Publication statusPublished - 2017 Feb 21
Event2016 IEEE Conference on Communications and Network Security, CNS 2016 - Philadelphia, United States
Duration: 2016 Oct 172016 Oct 19

Other

Other2016 IEEE Conference on Communications and Network Security, CNS 2016
CountryUnited States
CityPhiladelphia
Period16/10/1716/10/19

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'WHAP: Web-hacking profiling using Case-Based Reasoning'. Together they form a unique fingerprint.

  • Cite this

    Han, M. L., Han, H. C., Kang, A. R., Kwak, B. I., Mohaisen, A., & Kim, H. K. (2017). WHAP: Web-hacking profiling using Case-Based Reasoning. In 2016 IEEE Conference on Communications and Network Security, CNS 2016 (pp. 344-345). [7860503] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CNS.2016.7860503